The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Archive


2026 | 2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |

Results

Affiliation shown is the affiliation at the time the talk was given.

Episode #624
01/11/2017
Differential Guarantees for Cryptographic Systems

Differential Guarantees for Cryptographic Systems

Aniket Kate

Episode #625
01/18/2017
Emerging Cyber Threats

Emerging Cyber Threats

Nick Sturgeon - IN-ISAC

Episode #626
01/25/2017
Changing the Economics of the Network

Changing the Economics of the Network

Jean Camp - Indiana University

Episode #627
02/01/2017
Network Deception as a Threat Intelligence Platform

Network Deception as a Threat Intelligence Platform

Vincent Urias - Sandia

Episode #628
02/08/2017
Cyber Security in Large Complex Corporations

Cyber Security in Large Complex Corporations

Neil Cassidy

Episode #629
02/15/2017
Behavioral and Computational Aspects of Network Security Games

Behavioral and Computational Aspects of Network Security Games

Ashish Hota - Purdue University

Episode #630
02/22/2017
A2C: Self Destructing Exploit Executions via Input Perturbation

A2C: Self Destructing Exploit Executions via Input Perturbation

Yonghwi Kwon - Purdue University

03/01/2017

Cancelled

Episode #631
03/08/2017
The Rise of Cyber-Crime: A Legal Perspective

The Rise of Cyber-Crime: A Legal Perspective

Stephen Reynolds - Ice Miller

Episode #632
03/22/2017
CIO Risk Appetite and Information Security Management

CIO Risk Appetite and Information Security Management

Tawei (David) Wang - DePaul University

Episode #633
03/29/2017
DataShield: Configurable Data Confidentiality and Integrity

DataShield: Configurable Data Confidentiality and Integrity

Scott Carr - Purdue University

Episode #635
04/12/2017
Information Flow Security in Practical Systems

Information Flow Security in Practical Systems

Limin Jia - Carnegie Mellon University

Episode #636
04/19/2017
Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices

Pushing Computers to the Edge: Next Generation Security and Privacy Controls for Systems and IoT Devices

Ron Ross - National Institute for Standards and Technology (NIST)

Episode #637
04/26/2017
Enabling Trust and Efficiency in Provenance-Aware Systems

Enabling Trust and Efficiency in Provenance-Aware Systems

Adam Bates - University of Illinois at Urbana-Champaign

Episode #639
08/30/2017
The Stark Reality of Red vs. Blue and Why it's Not Working

The Stark Reality of Red vs. Blue and Why it's Not Working

Chris Roberts - Acalvio Technologies

Episode #640
09/06/2017
Secure Code Development

Secure Code Development

Doug Smith - Northrop Grumman

Episode #641
09/13/2017
Advanced Testing Assessments in the Power & Utilities Industry

Advanced Testing Assessments in the Power & Utilities Industry

Bob Cheripka - Deloitte

Episode #642
09/20/2017
Counter UAS Challenges and Technology

Counter UAS Challenges and Technology

Vince D'Angelo - SRC

Episode #643
09/27/2017
Vulnerability Scanning, how it works and why

Vulnerability Scanning, how it works and why

Tony Huffman - Tenable Network Security

Episode #644
10/04/2017
Friend or Foe? Your Wearable Devices Reveal Your Personal PIN

Friend or Foe? Your Wearable Devices Reveal Your Personal PIN

Xiaonan Guo - IUPUI

Episode #645
10/11/2017
Memory Hard Functions and Password Hashing

Memory Hard Functions and Password Hashing

Jeremiah Blocki

Episode #646
10/18/2017
Locally Differential Private Protocols for Frequency Estimation

Locally Differential Private Protocols for Frequency Estimation

Tianhao Wang - Purdue University

Episode #648
11/01/2017
Opportunities and Perils of the Cyber Revolution

Opportunities and Perils of the Cyber Revolution

Mikhail J. Atallah

Episode #649
11/08/2017
Refraction Networking: Censorship Circumvention in the Core of the Internet

Refraction Networking: Censorship Circumvention in the Core of the Internet

Nikita Borisov - University of Illinois at Urbana-Champaign

Episode #650
11/15/2017
Ad-Blockers: Extortionists or Digital Age Robin Hoods?

Ad-Blockers: Extortionists or Digital Age Robin Hoods?

Abhishek Ray

Episode #651
11/29/2017
Securing the Future of Business: Broadening the Role of Security Technology

Securing the Future of Business: Broadening the Role of Security Technology

Kirsten Bay - Cyber adAPT

Episode #652
12/06/2017
Penetration Testing: What? Why? How?

Penetration Testing: What? Why? How?

Nat Shere - Rook Security

Ways to Watch

YouTube

Watch Now!

Over 500 videos of our weekly seminar and symposia keynotes are available on our YouTube Channel. Also check out Spaf's YouTube Channel. Subscribe today!